Twin K-Shuffle Based Audio Steganography

Authors

  • Salamudeen Alhassan Department of Computer Science, University for Development Studies, Tamale, Ghana
  • Mohammed Ibrahim Daabo Department of Computer Science, C. K. Tedam University of Technology and Applied Sciences, Navrongo, Ghana
  • Gabriel Kofi Armah Department of Business Computing, C. K. Tedam University of Technology and Applied Sciences, Navrongo, Ghana

DOI:

https://doi.org/10.51983/ajeat-2022.11.1.3200

Keywords:

Steganography, K-Shuffle, Bit-Shuffling, Secret Message, Cover Audio, Stego Audio, Embedding Function, Extraction Function

Abstract

Secure communication is most effective when it is covert. In the realm of covert communication, steganography conceals secret message within a cover medium. This ensures that adversaries who have access to this carrier medium are unaware of the existence of the secret message. This paper proposes a novel twin K-Shuffling and embedding technique that scrambles and hides secret message inside audio samples. The scrambling phase of the proposed technique consists of bit and character shuffling. The bit-shuffling scrambles the bit-string of each character in the secret message into cipher-text via K-Shuffle. The characters of the resulting cipher-text are then shuffled by another K-Shuffle technique to yield chaotic cipher-text. At the embedding phase, the scrambled cipher-text is randomly planted into the carrier audio samples. The novelty in this proposed technique is the provision of a three-layer protection for secret messages; bit, character, and encoding layers. Results and analyses show that this technique satisfied both embedding and encryption requirements of steganographic systems.

References

R. Manisha, and T. Manisha, “Genetic algorithm in audio steganography,” ArXiv: abs/1407.2729, Vol. 13, No. 1, pp. 29-34, 2014.

N. Cvejic, and T. Seppanen, “Increasing the capacity of LSB-based audio steganography,” 2002 IEEE Workshop on Multimedia Signal Processing, St. Thomas, VI, USA, 2002. [Online]. Available: https://doi.org/10.1109/MMSP.2002.1203314

A. Koyun, and H. B. Macit, “Generating a stego-audio data using LSB technique and robustness test,” Journal of Engineering Sciences and Design, Vol. 6, No. 1, pp. 87-92, 2018.

K. Bhowal, D. Bhattacharyya, A. J. Pal, and T. H. Kim, “A GA based audio steganography with enhanced security,” Telecommunication Systems, Vol. 52, No. 4, pp. 2197-2204, 2011.

K. Bhowal, A. J. Pal, G. S. Tomar, and P. P. Sarkar, “Audio steganography using GA,” 2010 International Conference on Computational Intelligence and Communication Networks, 2010. [Online]. Available: https://doi.org/10.1109/CICN.2010.91

K. M. Christine, “Genetic algorithm based model in text steganography,” The African Journal of Information Systems, Vol. 5, No. 4, pp. 131-144, 2013.

B. A. Mitras, and N. F. H. al-Alusi, “Using hybird genetic algorithm in audio steganography,” Iraqi Journal of Statistical Sciences, Vol. 13, No. 25, pp. 150-164, 2013.

C. C. Sobin, and V. M. Manikandan “A Secure Audio Steganography Scheme using Genetic Algorithm,” 5th Proceedings of the IEEE International Conference Image Information Processing, ICIIP 2019, pp. 403-407, 2019.

S. F. Sultana, and D. C. Shubhangi, “Video encryption algorithm and key management using perfect shuffle,” Int. Journal of Engineering Research and Application, Vol. 7, No. 7, pp. 01-05, 2017.

S. Alhassan, M. M. Iddrisu, and M. I. Daabo, “Securing audio data using K-shuffle technique,” Multimedia Tools and Applications, Vol. 78, No. 23, pp. 33985-33997, 2019.

R. W. Packard, and E. S. Packard, “The Order of a perfect k-shuffle,” The Official Journal of the Fibonacci Association, pp. 136-44, 1994.

D. Persi, R. L. Graham, and W. M. Kantor, “The Mathematics of Perfect Shuffles,” Advance in Applied Mathematics, Vol. 4, pp. 175-196, 1983.

I. Z. Alhassan, E. D. Ansong, G. Abdul-Salaam, and S. Alhassan, “Enhancing image security during transmission using residue number system and K-shuffle,” Earthline Journal of Mathematical Sciences, Vol. 4, No. 2, pp. 399-424, 2020.

R. Kaur, J. Bhatia, H. S. Saini, and R. Kumar, “Multilevel Technique to Improve PSNR and MSE in Audio Steganography,” International Journal of Computer Applications, Vol. 103, pp. 1-4, 2014.

Z. Wang and A. C. Bovik, “Mean Squared Error: Love It or Leave It?”, IEEE Signal Processing Magazine[98], 2009. [Online]. Available: https://doi.org/10.1109/MSP.2008.930649.

Downloads

Published

01-06-2022

How to Cite

Alhassan, S., Daabo, M. I., & Armah, G. K. (2022). Twin K-Shuffle Based Audio Steganography. Asian Journal of Engineering and Applied Technology, 11(1), 1–4. https://doi.org/10.51983/ajeat-2022.11.1.3200